Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory (Yotamu Gangire, Adéle Da Veiga, Marlien Herselman).Pages 144-157Īddressing SME Characteristics for Designing Information Security Maturity Models (Bilge Yigit Ozkan, Marco Spruit).Pages 161-174Ĭyber Security Education and Training Delivering Industry Relevant Education and Skills via Degree Apprenticeships (Ismini Vasileiou).Pages 175-185 Information Security Behavioural Threshold Analysis in Practice: An Implementation Framework (D. KidsDoodlePass: An Exploratory Study of an Authentication Mechanism for Young Children (Esra Alkhamis, Helen Petrie, Karen Renaud).Pages 123-132 Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory (P. Alotaibi).Pages 85-96ĭoes Ubuntu Influence Social Engineering Susceptibility? (Ntsewa B.
#PS4 UPDATE FILE FOR REINSTALLATION 4.73 PROFESSIONAL#
Towards an Heuristic Approach to Cybersecurity and Online Safety Pedagogy (Simon Marsden).Pages 58-70ĬontextBased MicroTraining: A Framework for Information Security Training (Joakim Kävrestad, Marcus Nohlberg).Pages 71-81Įmployees’ Interest in Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test (Mohammed Khaled N. Towards a Cross-Cultural Education Framework for Online Safety Awareness (R. Johnstone, Michael Crowley, Patryk Szewczyk).Pages 3-15Ĭoncern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa (Adéle Da Veiga, Jacques Ophoff).Pages 16-29Ī Review of Information Security Aspects of the Emerging Covid-19 Contact Tracing Mobile Phone Applications (Georgios Magklaras, Lucia N.
Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? (Leah Shanley, Michael N.